agl / nullok
Scripts that I used to write a blog post about section 7.24.1(2) of C11
☆11Updated 8 years ago
Alternatives and similar repositories for nullok:
Users that are interested in nullok are comparing it to the libraries listed below
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 7 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 7 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 6 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Dan Kaminsky's clock drift entropy generator☆6Updated 10 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/master/tree/☆33Updated 9 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 8 years ago
- An RFC5297-compliant C implementation of AES-SIV☆19Updated 4 years ago
- Generator of "nothing-up-my-sleeve" constants☆23Updated 9 years ago
- A fast secure userspace pseudorandom number generator☆82Updated 10 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 4 months ago
- a web page / paper☆18Updated 8 years ago
- Experiments in high-assurance crypto.☆47Updated 2 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- A tool to extract code from individual functions in a library.☆16Updated 3 months ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Updated 7 years ago
- advanced unix-like hexadecimal editor and debugger☆37Updated last year
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- free crypto audit☆31Updated 7 years ago
- ☆15Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- cut out a small (binary) piece of a (binary) file☆15Updated 13 years ago
- An HTTPS Everywhere proxy for plugin incompatible browsers, and everywhere else.☆8Updated 10 years ago
- ☆17Updated 10 years ago
- Optimized version of the reference implementation of Ed25519☆36Updated last year